StudentShare solutions
Triangle menu

Security practices not meeting the challenges (info technology) - Essay Example

Nobody downloaded yet

Extract of sample
Security practices not meeting the challenges (info technology)

There is a long line of self-interested intruders ready and willing to capture this valuable data, and as our reliance on digital information has grown, so have the threats. Large concentrations of data, mobile devices, and the need to keep the data useful has all added to the vulnerability of our information technology. While our information system has worked to make our data more secure, the threats of attack and the divulging of information has become ever more prevalent. Information security is an ongoing process that can never quite meet the challenge of the security threats.
Security threats originate from three sources. There are internal threats from corrupt employees, external threats that originate from external attacks on the system, and system failure. While direct attacks may compromise the data, system failure can cause a loss of information or system shutdown. While developing a system of access control minimizes attacks, system failures are dealt with through a system of redundancy and audit tracking. These systems are open to compromise by direct attack or well meaning employees that practice lax security measures.
The security of a database or network often begins with access control. At the system level this may mean the use of passwords. Passwords are easily compromised and are often shared for the purposes of convenience. Levels of granting only necessary access to a system or a file have been more helpful as data is made available only on a need to know basis. However, in a fast paced team environment, this may require man-hours that far exceed the realistic value of the security. According to Hu, Ferrariolo, and Kuhn, "If a single permission is incorrectly configured, a user will either be ineffective in performing his/her duties or will be given access to unintended information and systems, which could result in undermining the security posture of the organization" (36). ...Show more
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security practices not meeting the challenges (info technology) Essay”, n.d.)
Retrieved from https://studentshare.net/miscellaneous/333514-security-practices-not-meeting-the-challenges-info-technology
(Security Practices Not Meeting the Challenges (info Technology) Essay)
https://studentshare.net/miscellaneous/333514-security-practices-not-meeting-the-challenges-info-technology.
“Security Practices Not Meeting the Challenges (info Technology) Essay”, n.d. https://studentshare.net/miscellaneous/333514-security-practices-not-meeting-the-challenges-info-technology.
  • Cited: 0 times

Summary

Personal information can be attained by criminals to establish an identity at the victims expense. Confidential personal and medical information can be compromised that may…
Security practices not meeting the challenges (info technology)
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Security practices not meeting the challenges (info technology)"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Security Technology
Introduction Security technology is an important part of any business, enabling businesses to protect their assets while reducing the amount of physical labor and time that is required. This allows the business to reduce their costs, by requiring fewer employees, or allocating employees to other tasks.
8 pages (2000 words) Essay
The Global Business Environment Meeting Challenges
Quality food at affordable prices with its prime agenda, Greggs currently holds a 1 million customer base and operates through 1500 shops around the United Kingdom The shops of Greggs are infiltrated around the streets of UK, local shopping parades and currently concentrated in the retail, airports, universities, bus rail interchanges, industrial arenas as well as in diverse locations explored by the people for living, work and squander their leisure time.
12 pages (3000 words) Essay
Enterprise Info Security
Buffer overflow/overrun is a form of interference where a program overruns the buffer's boundary and overwrites adjacent memory, while writing data to a buffer. Buffer overflows can be triggered by inputs that are designed to execute code, or alter the way the program operates.
5 pages (1250 words) Essay
EISA: Evaluating and Meeting the Security Needs
Nonetheless, with this convenience comes a myriad of risks including the risk of having valuable information misused, changed, stolen or lost. Electronically recorded information available in a network becomes more vulnerable than the printed information kept in a file behind a locked cabinet.
4 pages (1000 words) Essay
Meeting challenges for sustainable business
The political atmosphere in any country has a direct influence on the sustainability and flourishment of any business. A politically conducive environment is likely to attract investors from other countries and continents thus bringing a fresh perspective in the face of the country’s development
4 pages (1000 words) Essay
Info technology
Supply Chain Management can also be described as the process of efficiently planning, implementing and controlling the operations of the supply chain which includes movement and storage of raw materials, work in process
2 pages (500 words) Essay
Definition of security in info. sys
The input process consists of collecting data and transforming it to a form that is suitable for processing. Manipulation of this data gives information (processing). The information thus obtained is either stored for future use
2 pages (500 words) Essay
Enterprise Info Security
They are thus the basis of many software vulnerabilities and can be maliciously exploited Understanding the difference between data and
8 pages (2000 words) Essay
Leadership Challenges and Practices
ovides motivation to the employees, motivation is an extremely important factor and motivation can easily transform an employee within no time, ones the transformation of the employee takes place, the goals of the company would become much easier to achieve. This is why
9 pages (2250 words) Essay
Info technology
Moreover, this has led to a significant dependence between businesses and information system; thus, when a problem in the information system, the business is affected significantly. Nevertheless, there are some forms of businesses are highly dependent on the information
6 pages (1500 words) Essay
Comments (0)
Click to create a comment
Let us find you another Essay on topic Security practices not meeting the challenges (info technology) for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us